SlideShare a Scribd company logo
1
CHAPTER 1
INTRODUCTION
This Project focuses onto implement RF TX and RF RX based Banking
Security System. This system is implemented using an embedded microcontroller.
The embedded microcontroller used here is PIC 16F887
Actually, the aim of the project is to implement an Automated Banking
Security System. Security is the protection of something valuable to ensure that it
is not stolen, lost, or altered. GSM Based bank safety locker security system
provides more reliability and restricts the unauthorized person who is trying to
enter into bank. The microcontroller circuitry indicates the theft to the required
person.
Primarily, the system functions with the help of different technologies like
the Global Positioning System (GPS), traditional cellular network such as Global
System for Mobile Communications (GSM) and other radio frequency
medium.Today GSM fitted Banks, cars; ambulances, fleets and police vehicles are
common sights on the roads of developed countries. GSM based bank safety locker
security system is simple and costs less.
1.1 IDENTIFICATION NUMBER
Quiet similar to the above digital code lock, it works on the same principle.
This is the only thing which identifies the user as the registered nationalist as the
password here is the government registered identification number. It can be
anything driving license, passport, voter id, PAN card or any other proof. This is
the same as the one used for the identification purpose while opening an account or
a locker. This is set by the bank administration a verification.
2
CHAPTER 2
LITERATURE SURVEY
A MULTI-LAYER BANK SECURITY SYSTEM
Since last few years, security systems are getting more awareness and
importance. A Multi-Layer Bank Security System is a system for validating,
monitoring and controlling the security at bank locker rooms. Today, there are
many banks using authorize access control approach to prevent the locker room
from unauthorized access. In this paper highly reliable, multi-level and most
efficient locker room security system has been designed. The system includes a
biometric system, i.e. a fingerprint scanner and an iris scanner, which are
responsible for the security of the main door of the locker room and the system
also includes a RFID system to provide access of the locker room area to only
authorize people. To monitor the unauthorized people in the locker room area a
passive infrared sensor is fixed. In case of any unauthorized motion the picture
from the camera will be mailed to security officials and the alarms will be on to
inform the local security. The system proposed in this paper is a better security
system in terms of number of level of security.
AN EMBEDDED LABORATORY SECURITY MONITORING SYSTEM
This paper presents the design and implementation of an Embedded
Laboratory Security Monitoring System (ELSMS). The system includes a web
server which acquires video information through camera, and Wireless Sensor
Network (WSN) which gets environmental parameters through sensors and sends
them to the web server.When an exception occurs, the MS sends Short Message
Service (SMS) through GSM Modem, displays alarm information on web and
3
gives sound and light alarm, etc. SQLdatabase stores historical information related
toenvironmental parameters for users' query. The system proposed in this paper is a
kind of new monitoring system that is applicable to the lab and other fields that
store valuables.
DEVELOPMENTOF LOW COST PRIVATE OFFICE ACCESS CONTROL
SYSTEM (OACS)
Over the years, access control systems have become more and more
sophisticated and several security measures have been employed to combat the
menace of insecurity of lives and property. This is done by preventing
unauthorized entrance into buildings through entrance doors using conventional
and electronic locks, discrete access code, and biometric methods such as the
finger prints, thumb prints, the iris and facial recognition. We have designed a
flexible and low cost modular system based on integration of keypad, magnetic
lock and a controller. PIC 16F876A which is an 8-bit Microcontroller, is used here
as a main controller.
A DISTRIBUTED SMART CARD BASED ACCESS CONTROL SYSTEM
An access control system has the role to verify and mediate attempts made
by users to access resources in a system. An access control system maps activities
and resources to legitimate users. This paper presents a distributed smart card
based access control system for a building. The system is Internet centered. Each
door has a control access point and all these are connected to a server which will
grant or not the access. A user requests access by using a smart card which
memorizes the user's unique identity code.
INTELLIGENT HIGH-SECURITY ACCESS CONTROL
4
Access control is an important security issue in particular because of terrorist
threats. Access points are increasingly becoming equipped with advanced input
sensors often based on biometrics, and with advanced intelligent methods that
learn from experience. We have designed a flexible modular system based on
integration of arbitrary access sensors and an arbitrary number of stand-alone
modules. The system was tested with four sensors (a door sensor, an identity card
reader, a fingerprint reader and a camera) and four independent modules (expert-
defined rules, micro learning, macro learning and visual learning). Preliminary
tests of the designed prototype are encouraging.
BLOCK DIAGRAM
Fig:2.1 PIC16F887 transmitter
Micro
controller
PIC16F887
RF
Transmitter
KEYPAD
Power supply unit
Step down
transformer(2
32 to 12vAC)
Bridge
rectifier
Filter circuit Voltage
regulator(IC
7805)
LCD
5
Fig: 2.2 PIC16F887 with receiver
Micro
controller
PIC16F887
RF
Receiver
KEYPAD
Power Supply Unit
Step down
Transformer(230
to 12v AC)
Step down
Transformer(230
to 12v AC)
Bridge
Rectifier
ger
Filter
Circuit
Voltage
Regulator(IC
7805)
Relay DC Motor
LCD
6
CHAPTER 3
EXISTING SYSTEM
In most of the banks, the locker systems involve manual lock. Whenever the
user wishes the use the locker, he should be assisted by the bank employee which
leads to waste of time for both the customer and the employee. The major
drawbacks of such manual lock systems are lack of security and the waiting time
of the customers. It should be noted that the person accompanying the customer
can be any employee who is free at that instant of time. Solely, time is wasted. This
can be overcome by any automatic locker system. There are many techniques in
which this can be implemented. In this project, RFID tags are used which holds the
user’s information like locker number, username, etc., this RFID tag when read by
the RFID reader will automatically open and close the locker. Thereby, security is
guaranteed and the customers waiting time is drastically reduced.
HARDWARE DESCRIPTION
3.1PIC 16F887
RISC ARCHITECTURE
 Only 35 instructions to learn
 All single-cycle instructions except branches
 Operating frequency 0-20 MHz
 Precision internal oscillator
 Factory calibrated
 Software selectable frequency range of 8MHz to 31KHz
 Power supply voltage 2.0-5.5V
 Consumption: 220uA (2.0V, 4MHz), 11uA (2.0 V, 32 KHz) 50nA (stand-
by mode)
7
 Power-Saving Sleep Mode
 Brown-out Reset (BOR) with software control option
 35 input/output pins
 High current source/sink for direct LED drive
 software and individually programmable pull-up resistor
 Interrupt-on-Change pin
 K ROM memory in FLASH technology
 Chip can be reprogrammed up to 100.000 times
 In-Circuit Serial Programming Option
 Chip can be programmed even embedded in the target device
 256 bytes EEPROM memory
 Data can be written more than 1.000.000 times
 368 bytes RAM memory
A/D CONVERTER
 14-channels
 10-bit resolution
 3 independent timers/counters
 Watch-dog timer
 Analogue comparator module with
 Two analogue comparators
 Fixed voltage reference (0.6V)
 Programmable on-chip voltage reference
 PWM output steering control
 Enhanced USART module
 Supports RS-485, RS-232 and LIN2.0
 Auto-Baud Detect
 Master Synchronous Serial Port (MSSP)
8
 supports SPI and I2C mode
Fig:3.1PIN DIAGRAM
3.2 INOUT DESCRIPTION
Most pins of the PIC16F887 microcontroller are multi-functional as seen in
figure above. For example, designator RA3/AN3/Vref+/C1IN+ for the fifth pin of
the microcontroller indicates that it has the following functions:
 RA3 Port A third digital input/output
 AN3 Third analog input
 Vref+ Positive voltage reference
 C1IN+ Comparator C1 positive input
Such pin functionality is very useful as it makes the microcontroller package more
compact without affecting its operation. These various pin functions cannot be
used simultaneously, but can be changed at any point during operation.
9
3.3 CENTRAL PROCESSOR UNIT (CPU)
We are not going to bore you with the operation of the CPU at this stage.
However, we will just state that the CPU is manufactured with RISC technology as
it is an important factor when deciding which microcontroller to use.
RISC stands for Reduced Instruction Set Computer, which gives the PIC16F877
two great advantages:
 The CPU only recognizes 35 simple instructions. Just to mention that in order
to program other microcontrollers in assembly language it is necessary to know
more than 200 instructions by heart.
 The execution time is the same for almost all instructions, and lasts for 4 clock
cycles. The oscillator frequency is stabilized by a quartz crystal. The execution
time of jump and branch instructions is 2 clock cycles. It means that if the
microcontroller’s operating speed is 20MHz, the execution time of each
instruction will be 200nS, i.e. the program will execute 5 million instructions
per second!
The fundamental operation of most CPUs, regardless of the physical form
they take, is to execute a sequence of stored instructions that is called a
program. The instructions to be executed are kept in some kind of computer
memory. Nearly all CPUs follow the fetch, decode and execute steps in their
operation, which are collectively known as the instruction cycle.
After the execution of an instruction, the entire process repeats, with the next
instruction cycle normally fetching the next-in-sequence instruction because of
the incremented value in the program counter. In more complex CPUs,
multiple instructions can be fetched, decoded, and executed simultaneously.
10
This section describes what is generally referred to as the "classic RISC
pipeline".
FETCH
The first step, fetch, involves retrieving an instruction (which is represented
by a number or sequence of numbers) from program memory. The instruction's
location (address) in program memory is determined by a program counter (PC),
which stores a number that identifies the address of the next instruction to be
fetched. After an instruction is fetched, the PC is incremented by the length of the
instruction so that it will contain the address of the next instruction in the
sequence.Often, the instruction to be fetched must be retrieved from relatively slow
memory, causing the CPU to stall while waiting for the instruction to be returned.
This issue is largely addressed in modern processors by caches and pipeline
architectures.
DECODE
The instruction that the CPU fetches from memory determines what the CPU
will do. In the decode step, performed by the circuitry known as the instruction
decoder, the instruction is converted into signals that control other parts of the
CPU.The way in which the instruction is interpreted is defined by the CPU's
instruction set architecture (ISA).Often, one group of bits (that is, a "field") within
the instruction, called the opcode, indicates which operation is to be performed,
while the remaining fields usually provide supplemental information required for
the operation, such as the operands. Thoseoperands may be specified as a constant
value (called an immediate value), or as the location of a value that may be a
processor register or a memory address, as determined by some addressing mode.
In some CPU designs the instruction decoder is implemented as a hardwired,
unchangeable circuit. In others, a microprogram is used to translate instructions
11
into sets of CPU configuration signals that are applied sequentially over multiple
clock pulses. In some cases the memory that stores the microprogram is rewritable,
making it possible to change the way in which the CPU decodes instructions
EXECUTE
After the fetch and decode steps, the execute step is performed. Depending
on the CPU architecture, this may consist of a single action or a sequence of
actions. During each action, various parts of the CPU are electrically connected so
they can perform all or part of the desired operation and then the action is
completed, typically in response to a clock pulse. Very often the results are written
to an internal CPU register for quick access by subsequent instructions. In other
cases results may be written to slower, but less expensive and higher capacity main
memory.
For example, if an addition instruction is to be executed, the arithmetic logic
unit (ALU) inputs are connected to a pair of operand sources (numbers to be
summed), the ALU is configured to perform an addition operation so that the sum
of its operand inputs will appear at its output, and the ALU output is connected to
storage (e.g., a register or memory) that will receive the sum. Each basic operation
is represented by a particular combination of bits known as the machine language
opcode. While executing instructions in a machine language program, the CPU
decides which operation to perform by “decoding” the opcode.
A complete machine language instruction consists of an opcode and, in
many cases, additional bits that specify arguments for the operation. Going up the
complexity scale, a machine language program is a collection of machine language
instructions that CPU executes.The actual mathematical operation for each
12
instruction is performed by a combinational logic circuit within the CPU’s
processor known as the arithmetic logic unit or ALU.
Hardwired into a CPU's circuitry is a set of basic operations it can perform,
called an instruction set. Such operations may involve, for example, adding or
subtracting two numbers, comparing two numbers, or jumping to a different part of
a program. Each basic operation is represented by a particular combination of bits,
known as the machine language op code.While executing instructions in a machine
language program, the CPU decides which operation to perform by "decoding" the
opcode. A complete machine language instruction consists of an opcode and, in
many cases, additional bits that specify arguments for the operation (for example,
the numbers to be summed in the case of an addition operation). Going up the
complexity scale, a machine language program is a collection of machine language
instructions that the CPU executes.
The actual mathematical operation for each instruction is performed by a
combinational logic circuit within the CPU's processor known as the arithmetic
logic unit or ALU. In general, a CPU executes an instruction by fetching it from
memory, using its ALU to perform an operation, and then storing the result to
memory. Beside the instructions for integer mathematics and logic operations,
various other machine instructions exist, such as those for loading data from
memory and storing it back, branching operations, and mathematical operations on
floating-point numbers performed by the CPU's floating-point unit (FPU).
CONTROL UNIT
The control unit of the CPU contains circuitry that uses electrical signals to
direct the entire computer system to carry out stored program instructions. The
control unit does not execute program instructions; rather, it directs other parts of
13
the system to do so. The control unit communicates with both the ALU and
memory.
ARITHMETIC LOGIC UNIT
The arithmetic logic unit (ALU) is a digital circuit within the processor that
performs integer arithmetic and bitwise logic operations. The inputs to the ALU
are the data words to be operated on (called operands), status information from
previous operations, and a code from the control unit indicating which operation to
perform. Depending on the instruction being executed, the operands may come
from internal CPU registers or external memory, or they may be constants
generated by the ALU itself.When all input signals have settled and propagated
through the ALU circuitry, the result of the performed operation appears at the
ALU's outputs. The result consists of both a data word, which may be stored in a
register or memory, and status information that is typically stored in a special,
internal CPU register reserved for this purpose.
MEMORY MANAGEMENT UNIT
Most high-end microprocessors (in desktop, laptop, server computers) have
a memory management unit, translating logical addresses into physical RAM
addresses, providing memory protection and paging abilities, useful for virtual
memory. Simpler processors, especially microcontrollers, usually don't include an
MMU.
3.4MEMORY
The PIC16F887 has three types of memory ROM, RAM and EEPROM. All
of them will be separately discussed since each has specific functions, features and
organization.
14
3.4.1ROM MEMORY
ROM memory is used to permanently save the program being executed. This
is why it is often called ‘program memory’. The PIC16F887 has 8Kb of ROM (in
total of 8192 locations). Since the ROM memory is made with FLASH technology,
its contents can be changed by providing a special programming
voltage(13V).However, it is not necessary to explain it in detail as being
automatically performed by means of a special program on the PC and a simple
electronic device called the programmer.
3.4.2EEPROM MEMORY
Similar to program memory, the contents of EEPROM is permanently saved,
even when the power goes off. However, unlike ROM, the contents of EEPROM
can be changed during the operation of the microcontroller. This is why this
memory (256 locations) is perfect for permanently saving some of the results
created and used during the operation.
3.4.3 RAM MEMORY
This is the third and the most complex part of microcontroller memory. In
this case, it consists of two parts: general-purpose registers and special-function
registers (SFR). All these registers are divided in four memory banks to be
explained later in the chapter.
15
Even though both groups of registers are cleared when power goes off and
even though they are manufactured in the same manner and act in a similar way,
their functions do not have many things in common.
3.5GENERAL-PURPOSE REGISTERS
General-purpose registers are used for storing temporary data and results
created during operation. For example, if the program performs counting (products
on the assembly line), it is necessary to have a register which stands for what we in
everyday life call ‘sum’. Since the microcontroller is not creative at all, it is
necessary to specify the address of some general purpose register and assign it that
function. A simple program to increment the value of this register by 1, after each
product passes through a sensor, should be created.Now the microcontroller can
execute the program as it knows what and where the sum to be incremented is.
Similarly, each program variable must be pre-assigned some of the general-
purpose registers.
3.6SPECIAL FUNCTION REGISTERS (SFRS)
Special-function registers are also RAM memory locations, but unlike
general-purpose registers, their purpose is predetermined during manufacturing
process and cannot be changed. Since their bits are connected to particular circuits
on the chip (A/D converter, serial communication module, etc.), any change of
their contents directly affects the operation of the microcontroller or some of its
circuits. For example, the ADCON0 register controls the operation of A/D
converter. By changing its bits it is determined which port pin is to be configured
as converter input, the moment conversion is to start as well as the speed of
conversion.Another feature of these memory locations is that they have their
16
names (both registers and their bits), which considerably simplifies the process of
writing a program. Since high-level programming languages can use the list of all
registers with their exact addresses, it is enough to specify the name of a register in
order to read or change its contents.
3.7RAM MEMORY BANKS
The RAM memory is partitioned into four banks. Prior to accessing any
register during program writing (in order to read or change its contents), it is
necessary to select the bank which contains that register. Two bits of the STATUS
register are used for bank selection to be discussed later. In order to simplify the
operation, the most commonly used SFRs have the same address in all banks,
which enables them to be easily accessed.
3.8STACK
A part of RAM used as stack consists of eight 13-bit registers. Before the
microcontroller starts to execute a subroutine (CALL instruction) or when an
interrupt occurs, the address of the first next instruction to execute is pushed onto
the stack, i.e. one of its registers. Thanks to that the microcontroller knows from
where to continue regular program execution upon a subroutine or an interrupt
execution. This address is cleared after returning to the program because there is
no need to save it any longer, and one location of the stack becomes automatically
available for further use.
It is important to bear in mind that data is always circularly pushed onto the
stack. It means that after the stack has been pushed eight times, the ninth push
overwrites the value that was stored with the first push. The tenth push overwrites
the second push and so on. Data overwritten in this way is not recoverable. In
17
addition, the programmer cannot access these registers for write or read and there
is no Status bit to indicate stack overflow or stack underflow conditions. For this
reason, it is necessary to take special care of it during program writing.
3.9LCD
A liquid-crystal display (LCD) is a flat panel display, electronic visual
display, or video display that uses the light modulating properties of liquid crystals.
Liquid crystals do not emit light directly.LCDs are available to display arbitrary
images (as in a general-purpose computer display) or fixed images which can be
displayed or hidden, such as preset words, digits, and 7-segment displays as in a
digital clock. They use the same basic technology, except that arbitrary images are
made up of a large number of small pixels, while other displays have larger
elements.
Fig:3.2 LCD
LCDs are used in a wide range of applications including computer monitors,
Televisions, instrument panels, aircraft cockpit displays, and signage. They are
common in consumer devices such as DVD players, gaming devices, clocks,
watches, calculators, and telephones, and have replaced cathode raytube (CRT)
displays in most applications. They are available in a wide arrange of screen sizes
than CRT and plasma displays, and since they do notuse phosphors, they do not
suffer image burn-in. LCDs are, however, susceptible to image persistence.The
LCD screen is more energy efficient and can be disposed of more safelythan a
18
CRT. Liquid crystals do not emit light directly.LCDs are available to display
arbitrary images (as in a general-purpose computer display) or fixed images which
can be displayed or hidden, such as preset words, digits, and 7-segment displays as
in a digital clock. They use the same basic technology, except that arbitrary images
are made up of a large number of small pixels, while other displays have larger
elements.They are common in consumer devices such as DVD players, gaming
devices, clocks, watches, calculators, and telephones, and have replaced cathode
raytube (CRT) displays in most applications. They are available in a wide arrange
of screen sizes than CRT and plasma displays, and since they do notuse phosphors,
they do not suffer image burn-in. LCDs are, however,susceptible to image
persistence.
3.9.1PIN DIAGRAM FOR LCD
Fig: 3.3PIN CONFIGURATION OF LCD
Usually these days you will find single controller LCD modules are used
more in the market. So in the tutorial we will discuss more about the single
controller LCD, the operation and everything else is same for the double controller
too. The following gives a look at the basic information which is there in every
LCD.
19
Busy Flag is a status indicator flag for LCD. When we send a command or
data to the LCD for processing, this flag is set (i.e. BF =1) and as soon as the
instruction is executed successfully this flag is cleared (BF = 0). This is helpful in
producing and exact amount of delay for the LCD processing. To read Busy Flag,
the condition RS = 0 and R/W = 1 must be met and The MSB of the LCD data bus
(D7) act as busy flag. When BF = 1 means LCD is busy and will not accept next
command or data and BF = 0 means LCD is ready for the next command or data to
process.
There are two 8-bit registers in HD44780 controller Instruction and Data
register. Instruction register corresponds to the register where you send
commandsto LCD E.g. LCD shift command, LCD clear, LCD address etc. and
Data register is used for storing data which is to be displayed on LCD. , which
operate at different speeds, or various peripheral control devices.
20
The internal operation of the LCD is determined by signals sent from the
MCU when send the enable signal of the LCD is asserted, the data on the pins is
latched in to the data register and data is then moved automatically to the DDRAM
and hence is displayed on the LCD. Data Register is not only used for sending
data to DDRAM but also for CGRAM, the address where you want to send the
data, is decided by the instruction you send to LCD. We will discuss more on LCD
instruction set further in this tutorial.
21
Only the instruction register (IR) and the data register (DR) of the LCD can be
controlled by the MCU. when send the enable signal of the LCD is asserted, the
data on the pins is latched in to the data register and data is then moved
automatically to the DDRAM and hence is displayed on the Before starting the
internal operation of the LCD, control information is temporarily stored into these
registers to allow interfacing with various MCUs, which operate at different
speeds, or various peripheral control devices. The internal operation of the LCD is
determined by signals sent from the MCU. These signals, which include register
selection signal (RS), read/write signal (R/W), and the data bus (DB0 to DB7),
make up the LCD instructions (Table 3).
3.10RF TX & RX
In generally, the wireless systems designer has two overriding constraints: it
must operate over a certain distance and transfer a certain amount of information
within a data rate. The RF modules are very small in dimension and have a wide
operating voltage range i.e. 3V to 12V.
Basically the RF modules are 433 MHz RF transmitter and receiver
modules. The transmitter draws no power when transmitting logic zero while fully
suppressing the carrier frequency thus consume significantly low power in battery
operation. When logic one is sent carrier is fully on to about 4.5mA with a 3volts
power supply. The data is sent serially from the transmitter which is received by
the tuned receiver. Transmitter and the receiver are duly interfaced to two
microcontrollers for data transfer.
Features of RF Module:
 Receiver frequency 433MHz
22
 Receiver typical frequency 105Dbm
 Receiver supply current 3.5mA
 Low power consumption
 Receiver operating voltage 5v
 Transmitter frequency range 433.92MHz
 Transmitter supply voltage 3v~6v
 Transmitter output power 4v~12v
Main Factors Affecting RF Module’s Performance
As compared to the other radio-frequency devices, the performance of an RF
module will depend on several factors like by increasing the transmitter’s power a
large communication distance will be gathered. However, which will result in high
electrical power drain on the transmitter device, which causes shorter operating life
of the battery powered devices. Also by using this devices at higher transmitted
power will create interference with other RF devices.
433 MHz RF Transmitter and Receiver:
In many projects we use RF modules for transmit and receive the data
because it has high volume of applications than IR. RF signals travel in the
transmitter and receiver even when there is an obstruction. It operates at a specific
frequency of 433MHz.RF transmitter receives serial data and transmits to the
receiver through an antenna which is connected to the 4th pin of the transmitter.
When logic 0 applied to transmitter then there is no power supply in transmitter.
When logic 1 is applied to transmitter then transmitter is ON and there is a high
power supply in the range of 4.5mA with 3V voltage supply.
23
Features of RF Transmitter and Receiver:
 Receiver frequency: 433MHz
 Receiver typical sensitivity: 105Dbm
 Receiver current supply: 3.5mA
 Receiver operating voltage: 5V
 Low power consumption
 Transmitter frequency range: 433.92MHz
 Transmitter supply voltage: 3V~6V
 Transmitter output power: 4~12Dbm
3.10.1 DC MOTOR
In any electric motor, operation is based on simple electromagnetism.
A current-carrying conductor generates a magnetic field; when this is then placed
in an external magnetic field, it will experience a force proportional to
the current in the conductor, and to the strength of the external magnetic field. As
you are well aware of from playing with magnets as a kid, opposite (North and
South) polarities attract, while like polarities (North and North, South and South)
repel. The internal configuration of a DC motor is designed to harness the
magnetic interaction between a current-carrying conductor and an external
magnetic field to generate rotational motion.By looking at a simple 2-
pole DC electric motor (here red represents a magnet or winding with a "North"
polarization, while green represents a magnet or winding with a "South"
polarization).
24
Fig:3.4DC MOTOR TWO POLE
Every DC motor has six basic parts -- axle, rotor (a.k.a., armature), stator,
commutator, field magnet(s), and brushes. In most common DC motors (and all
that Beamers will see), the external magnetic field is produced by high-strength
permanent magnets1. The stator is the stationary part of the motor -- this includes
the motor casing, as well as two or more permanent magnet pole pieces. The rotor
(together with the axle and attached commutator) rotate with respect to the stator.
The rotor consists of windings (generally on a core), the windings being
electrically connected to the commutator. The above diagram shows a common
motor layout -- with the rotor inside the stator (field) magnets.
In real life, though, DC motors will always have more than two poles (three
is a very common number). In particular, this avoids "dead spots" in the
commutator. You can imagine how with our example two-pole motor, if the rotor
is exactly at the middle of its rotation (perfectly aligned with the field magnets), it
will get "stuck" there. Meanwhile, with a two-pole motor, there is a moment where
the commutator shorts out the power supply (i.e., both brushes touch both
commutator contacts simultaneously). This would be bad for the power supply,
waste energy, and damage motor components as well. Yet another disadvantage of
such a simple motor is that it would exhibit a high amount of torque "ripple" (the
amount oftorque it could produce is cyclic with the position of the rotor). So since
25
most small DC motors are of a three-pole design, let's tinker with the workings of
one via an interactive animation (JavaScript required):
Fig:3.5DC MOTOR 3 POLE
By noticing a few things from this -- namely, one pole is fully energized at a
time (but two others are "partially" energized). As each brush transitions from one
commutator contact to the next, one coil's field will rapidly collapse, as the next
coil's field will rapidly charge up (this occurs within a few microsecond). We'll see
more about the effects of this later, but in the meantime you can see that this is a
direct result of the coil windings' series wiring: The use of an iron core armature
(as in the Mabuchi, above) is quite common, and has a number of advantages2.
First off, the iron core provides a strong, rigid support for the windings -- a
particularly important consideration for high-torque motors.
The core also conducts heat away from the rotor windings, allowing the
motor to be driven harder than might otherwise be the case. Iron core construction
is also relatively inexpensive compared with other construction types.
26
In small motors, an alternative design is often used which features a
'coreless' armature winding. This design depends upon the coil wire itself for
structural integrity. As a result, the armature is hollow, and the permanent magnet
can be mounted inside the rotor coil. Coreless DC motors have much lower
armature inductance than iron-core motors of comparable size, extending brush
and commutator life.
Fig:3.6DC MOTOR
3.10.2 RELAY
An iron core is surrounded by a control coil. As shown, the power source is
given to the electromagnet through a control switch and through contacts to the
load. When current starts flowing through the control coil, the electromagnet starts
energizing and thus intensifies the magnetic field. Thus the upper contact arm
starts to be attracted to the lower fixed arm and thus closes the contacts causing a
short circuit for the power to the load. On the other hand, if the relay was already
de-energized when the contacts were closed, then the contact move oppositely and
make an open circuit.As soon as the coil current is off, the movable armature will
be returned by a force back to its initial position. This force will be almost equal to
half the strength of the magnetic force. This force is mainly provided by two
factors. They are the spring and also gravity.
Relays are mainly made for two basic operations. One is low voltage
application and the other is high voltage. For low voltage applications, more
27
preference will be given to reduce the noise of the whole circuit. For high voltage
applications, they are mainly designed to reduce a phenomenon called arcing.
Fig:3.7 RELAY
3.10.3 RELAY BASICS
The basics for all the relays are the same. Take a look at a 4 – pin relay shown
below. There are two colours shown. The green colour represents the control
circuit and the red colour represents the load circuit. A small control coil is
connected onto the control circuit. A switch is connected to the load. This switch is
controlled by the coil in the control circuit. Now let us take the different steps that
occur in a relay.
 Energized Relay (ON)
As shown in the circuit, the current flowing through the coils
represented by pins 1 and 3 causes a magnetic field to be aroused. This
magnetic field causes the closing of the pins 2 and 4. Thus the switch plays
28
an important role in the relay working. As it is a part of the load circuit, it is
usedto control an electrical circuit that is connected to it. Thus, when the
relay in energized the current flow will be through the pins 2 and 4.
Fig:3.8ENERGIZED RELAY (ON)
 De – Energized Relay (OFF)
As soon as the current flow stops through pins 1 and 3, the switch opens and
thus the open circuit prevents the current flow through pins 2 and 4.
29
Fig: 3.9DE-ENERGIZED RELAY (OFF)
 Single Pole Single Throw (SPST) – This type of relay has a total of four
terminals. Out of these two terminals can be connected or disconnected. The
other two terminals are needed for the coil.
 Single Pole Double Throw (SPDT) – This type of a relay has a total of five
terminals. Out f these two are the coil terminals. A common terminal is also
included which connects to either of two others.
 Double Pole Single Throw (DPST) – This relay has a total of six terminals.
These terminals are further divided into two pairs. Thus they can act as two
SPST’s which are actuated by a single coil. Out of the six terminals two of
them are coil terminals.
30
 Double Pole Double Throw (DPDT) – This is the biggest of all. It has
mainly eight relay terminals. Out of these two rows are designed to be
change over terminals. They are designed to act as two SPDT relays which
are actuated by a single coil.
RELAY APPLICATIONS
 Relays are used to realize logic functions. They play a very important role in
providing safety critical logic.
 Relays are used to provide time delay functions. They are used to time the
delay open and delay close of contacts.
 Relays are used to control high voltage circuits with the help of low voltage
signals. Similarly they are used to control high current circuits with the help
of low current signals.
 They are also used as protective relays. By this function all the faults during
transmission and reception can be detected and isolated.
 Relays were primarily used in telegraph to regenerate weak signals received
at intermediate transmissions during transmission.
 Low power devices such as Microprocessors can drive relays to control
electrical loads beyond their direct drive capability.
 In an automobile, a starter relay allows the high current of the cranking
motor to be controlled with small wiring and contacts in the ignition key
 They are more resistant than semiconductors to nuclear radiation and are
used also as circuit breakers and protective relays.
31
CHAPTER 4
SOFTWARE REQUIREMENTS
The software which is used in this technique is shown below.
 Real time operating system
 MP Lab v8.63
 Proteus8.
 Embedded C
The proposed system’s software section has Real Time Operating System only,
because this proposed system design is minimal cost so it doesn’t need any higher
end and costly software but it needs reliable, secure, multi tasked, preemptive and
real OS software.
REAL TIME OPERATING SYSTEM
Commercial Operating system form a continuum of functionality,
performance and price. These operating systems range from those that offer a basic
preemptive scheduler, a few key system services, are usually inexpensive, come
with modifiable source code and are royalty free to those more
sophisticated operating systems that typically include a lot of functionality
beyond the basic scheduler and can be quite expensive. With such a variety of
operating systems and features to choose from, it can be difficult to decide which is
best for embedded application. Many developers make their decision based on
performance, functionality or compatibility with their choice of compiler,
debugger and other development tools. Many use integrated development
environments (IDEs) that enable them to develop over a wider range of RTOSs.A
real-time operating system (RTOS) is an operating system that guarantees a certain
capability within a specified time constraint. For example, an operating system
32
might be designed to ensure that a certain object was available for a robot on an
assembly line. In what is usually called a "hard" real-time operating system, if the
calculation could not be performed for making the object available at the
designated time, the operating system would terminate with a failure. In a "soft"
real-time operating system, the assembly line would continue to function but the
production output might be lower as objects failed to appear at their designated
time, causing the robot to be temporarily unproductive. Some real-time operating
systems are created for a special application and others are more general purpose.
Some existing general purpose operating systems claim to be a real-time operating
systems. To some extent, almost any general purpose operating system such as
Microsoft's Windows 2000can be evaluated for its real-time operating system
qualities. That is, even if an operating system doesn't qualify, it may have
characteristics that enable it to be considered as a solution to a particular real-time
application problem.
MPLAB VERSION 8.6
MPLAB is a free integrated development environment for the development
of embedded applications on PIC and PICmicrocontrollers, and is developed by
Microchip Technology.
MPLAB X is the latest edition of MPLAB, and is developed on the Net
Beansplatform. MPLAB and MPLAB X support project management, code
editing, debugging and programming of Microchip 8-bit, 16- bit and 32-
bit PIC microcontrollers.
MPLAB is designed to work with MPLAB- certified devices such as
the MPLAB ICD 3 and MPLAB REAL ICE, for programming and debugging
33
PIC Microcontrollers using a personal computer. PICKitprogrammers are
alsosupported by MPLAB.
PROTEUS 8
Proteus 7.0 is a Virtual System Modelling (VSM) that combines circuit
simulation, animated components and microprocessor models to co-simulate the
complete microcontroller based designs. This is the perfect tool for engineers to
test their microcontroller designs before constructing a physical prototype in real
time. This program allows users to interact with the design using on-screen
indicators and/or LED and LCD displays and, if attached to the PC, switches and
buttons.One of the main components of Proteus 7.0 is the Circuit Simulation-
product that uses a SPICE3f5 analogue simulator kernel combined with an event-
driven digital simulator that allow users to utilize any SPICE model by any
manufacturer. Proteus VSM comes with extensive debugging features, including
breakpoints, single stepping and variable display for a neat design prior to
hardware prototyping.
In summary, Proteus 7.0 is the program to use when you want to simulate
the interaction between software running on a microcontroller and any analog or
digital electronic device connected to it. The application framework lets you view
modules of Proteus as tabs in a single window or, via drag and drop, as separate
windows for a side-by-side view The common parts database enables sharing of
information between schematic and PCB so that changes to data areinstantly
reflected across the software. The integrated VSMStudio IDE binds your
firmware project to your schematic design and Active Popups bring the schematic
into your VSMStudio debug session.
34
EMBEDDED C
Embedded C is a set of language extensions for the C Programming
language by the C Standards committee to address commonality issues that exist
between C extensions for different embedded systems. Historically, embeddedC
programming requires non-standard extensions to the C language in order to
support exotic features such as fixed-point arithmetic, multiple distinct memory
blank, and basic I/O operations. In 2008, the C Standards Committee extended the
C language to address these issues by providing a common standard for all
implementations to adhere to. It includes a number of features not available in
normal C, such as, fixed-point arithmetic, named address spaces, and basic I/O
hardware addressing.
35
CHAPTER 5
IMPLEMENTATION& RESULTS
PIC TRANSMITTER OUTPUT:
SENDING MESSAGETO RECEIVER
36
37
PIC RECEIVER OUTPUT:
ENCRYPTEDMESSAGEFROM TRANSMITTER
38
AFTER DECRYPTING MESSAGE AT THE RECEIVER:
39
CHAPTER 6
CONCLUSION
This is a real time application based project which emphasizeson bringing a
revolution in the bank locker security system by making the procedure a little easy
and more systematic for the bank officials. This is just a proposed model which
when implemented would surely give a very good protection to the lockers curbing
theft and making the lockers more reliable. The assurance given to the bank
customers will encourage them to use it and hence protect their valuables from
theft or any kind of robbery. This not only aims at easing the work load of the bank
officials but also makes it an easy and comfortable process for its users, the general
public. As this is protected by the vicinity sensor it can detect any unwanted or
forced entry inside the bank locker area and can protect the lockers in the most
efficient way.
40
REFERENCES
[1]. Parvathy A, Venkata Rohit Raj, Venumadhav, Manikanta, “RFID Based Exam
Hall Maintenance System’’, IJCA Special Issue on “Artificial Intelligence
Techniques - Novel Approaches & Practical Applications” AIT, 2011
[2]. Gyanendra K Verma, Pawan Tripathi, “A Digital Security System with Door
Lock System Using RFID Technology”, International Journal of Computer
Applications (IJCA) (0975 – 8887), Volume 5– No.11, August 2010
[3]. Kumar Chaturvedula .U.P, “RFID Based Embedded System for Vehicle
Tracking and Prevention of Road Accidents”, International Journal of Engineering
Research & Technology (IJERT) , Vol. 1 Issue 6, August – 2012, ISSN: 2278-
0181
[4]. Islam, N.S. Wasi-ur-Rahman, M. “An intelligent SMSbased remote Water
Metering System”. 12th International Conference on Computers and Information
Technology, 2009, 21-23 Dec. 2009, Dhaka, Bangladesh.
[5]. Mohd Helmy Abd Wahab, Siti Zarina Mohd Muji, Fazliza Md. Nazir.
“Integrated Billing System through GSM Network”. In Proceeding of 3rd
41
International Conference on Robotics, Vision, Information and Signal Processing
2007 (ROVISP2007), Penang, 28 – 30 November 2007
[6]. Mohd Helmy Abd Wahab, Azhar Ismail, Ayob Johari and Herdawatie Abdul
Kadir. “SMS-Based Electrical Meter Reading”.
[7] Saranya K, R Mohanapriya, J Udhayan, “A Review on SymmetricKey
Encryption Techniques in Cryptography”, Internation Journal of
Science, Engineering and Technology Research (IJSETR), Volume 3,
Issue 3, March 2014
[8] MajdiAl-qdah& Lin Yi Hui “Simple Encryption/Decryption Application”
published in International Journal of Computer Science
and Security, Volume (1) : Issue (1).
[9] Gupta Vishwa, Singh Gajendra, Gupta Ravindra, “Advance cryptography
algorithm to improve data security”, IJARCSSE,
Volume 2, Issue 1, January 20112 ISSN: 2277 128X
[10] Dhull Sonia, BeniwalSonal, KalraPreeti, “Polyalphabetic Cipher Techniques
Used for Encryption Purpose”, IJARCSSE, Volume 3,
Issue 2, February 2013, ISSN 2277 128X
[11]VikasAgarwal ,ShrutiAgarwal and Rajesh Deshmukh“Analysis and review of
encryption and decryption for secure
communication”,IJSER, Volume 2,Issue 2,February 2014,ISSN:2347-
3848.
[12] KohliRashi, Kumar Manoj, “Optimized on System Analysis Using AES and
X-tea”, IJARCSSE, Volume 3, Issue 2, February 2013,
42
ISSN: 2277 128X
[13] Mitali, Kumar Vijay, Sharma Arvind, “A Survey on Various Cryptography
Techniques”, IJETTCS, Volume 3, Issue 4, July-
August 2014, ISSN 2278-6856
[14] Mao Wenbo, Boyd Colin, “Classification of Cryptographic Techniques in
Authentication Protocols”, Communications Research
Laboratory, Department of Electrical Engineering, University of
Manchester
[15] Gyanendra K Verma, PawanTripathi, “A Digital Security System with Door
Lock System Using RFID Technology”, International Journal of Computer
Applications (IJCA) (0975 – 8887), Volume 5– No.11, August 2010
[16] Carelin Felix and I. Jacob Raglend, “Home Automation Using GSM”,
Proceedings of 2011 International Conference on Signal Processing,
Computing and Networking Technologies, pp. 15-19, 2011
[17] Pravada P. Wankhade1 and Prof. S.O. Dahad2, “Real Time Vehicle locking
and Tracking System using GSM and GPS Technology-An Anti-theft System”,
International Journal of Technology And Engineering System(IJTES):
Jan –March 2011- Vol.2.No.3.
[18] Ahmad A.W., Jan N., Iqbal S. and Lee C., “ Implementation of ZigBee-GSM
based home security monitoring and remote control system”, IEEE 54th
International Midwest Symposium on Circuits and Systems
43

More Related Content

PDF
IJISET_V2_I6_90
PDF
Keypad Based Bank Locker Security System Using Gsm Technology
PPTX
Locker opening and closing system using rfid password and gsm
PDF
FINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
PDF
Rfid based automated bank locker system
PDF
Fingerprint base security system
PPT
ARM BASED 4-BIT CODED LOCKER
PDF
Smart Security Lock for Access Control Applications based on GSM
IJISET_V2_I6_90
Keypad Based Bank Locker Security System Using Gsm Technology
Locker opening and closing system using rfid password and gsm
FINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
Rfid based automated bank locker system
Fingerprint base security system
ARM BASED 4-BIT CODED LOCKER
Smart Security Lock for Access Control Applications based on GSM

What's hot (20)

PDF
J04701080085
PDF
Tracking police man using rf proximity card
DOC
14983184 industrial-security-system-using-auto-dialer
PPTX
Bank locker system
PPTX
Fingerprint base security system
PPTX
Embedded based home security system
PDF
Rotary RFID Parking Management Solution Controlled By Microcontroller
DOC
Bm 07 FINGER PRINT BASED VEHICLE SECURITY SYSTEM
DOC
Bm 09 FINGER PRINT BASED PHYSICAL ACCESS CONTROL VEHICLE IMMOBILIZER ...
PDF
Bio station t2
DOC
Fingerprint based security system
PDF
To protect user’s password from theft by using rfid and mems technology
PDF
F0463842
PPT
Identica Vascular Biometrics
PPTX
Gsm based industrial security system
DOCX
Information security proposal for electronic door lock
PPT
Access control basics-5
PPTX
Bank locker system
PPTX
gsm based security system
PDF
4.b.tech project list 2008 09
J04701080085
Tracking police man using rf proximity card
14983184 industrial-security-system-using-auto-dialer
Bank locker system
Fingerprint base security system
Embedded based home security system
Rotary RFID Parking Management Solution Controlled By Microcontroller
Bm 07 FINGER PRINT BASED VEHICLE SECURITY SYSTEM
Bm 09 FINGER PRINT BASED PHYSICAL ACCESS CONTROL VEHICLE IMMOBILIZER ...
Bio station t2
Fingerprint based security system
To protect user’s password from theft by using rfid and mems technology
F0463842
Identica Vascular Biometrics
Gsm based industrial security system
Information security proposal for electronic door lock
Access control basics-5
Bank locker system
gsm based security system
4.b.tech project list 2008 09
Ad

Similar to Bank security using MC (20)

DOCX
Smart home project technical paper
PDF
protection on lineman while working on transmission line report
DOC
12.automatic toll gate billing system using rfid.
PDF
Voice Recognition Wireless Home Automation System Based On Zigbee
PDF
Voice Recognition Wireless Home Automation System Based On Zigbee
PDF
Voice Recognition Wireless Home Automation System Based On Zigbee
DOCX
Report on Embedded Based Home security system
DOCX
Sdfgh
PDF
Intellectual Bank Locker Security System
PDF
Intellectual Bank Locker Security System
PDF
Implementation of vision based intelligent home security system using ARM7
PPTX
Microcontoller and Embedded System
DOC
REPORT texto braillefinal
PPTX
Iot based garbage monitoring system
PDF
Security Protocols for USB Mass Storage Devices
PPTX
Smart vault ppt
PDF
Health Monitoring System of Elderly using Wireless Sensor NetworkIjcatr04031005
DOC
Finger print recognized atm system
PPTX
Dharshan INTERNSHIP PPT-1.pptx
PPTX
Embedded systems - UNIT-1 - Mtech
Smart home project technical paper
protection on lineman while working on transmission line report
12.automatic toll gate billing system using rfid.
Voice Recognition Wireless Home Automation System Based On Zigbee
Voice Recognition Wireless Home Automation System Based On Zigbee
Voice Recognition Wireless Home Automation System Based On Zigbee
Report on Embedded Based Home security system
Sdfgh
Intellectual Bank Locker Security System
Intellectual Bank Locker Security System
Implementation of vision based intelligent home security system using ARM7
Microcontoller and Embedded System
REPORT texto braillefinal
Iot based garbage monitoring system
Security Protocols for USB Mass Storage Devices
Smart vault ppt
Health Monitoring System of Elderly using Wireless Sensor NetworkIjcatr04031005
Finger print recognized atm system
Dharshan INTERNSHIP PPT-1.pptx
Embedded systems - UNIT-1 - Mtech
Ad

Recently uploaded (20)

PPTX
_Dispute Resolution_July 2022.pptxmhhghhhh
PPT
notes_Lecture2 23l3j2 dfjl dfdlkj d 2.ppt
PPT
APPROACH TO DEVELOPMENTALlllllllllllllllll
PPTX
Principles of Inheritance and variation class 12.pptx
PPTX
Your Guide to a Winning Interview Aug 2025.
PPTX
A slide for students with the advantagea
PPTX
PE3-WEEK-3sdsadsadasdadadwadwdsdddddd.pptx
PPTX
Condensed_Food_Science_Lecture1_Precised.pptx
PPTX
Prokaryotes v Eukaryotes PowerPoint.pptx
PPTX
Definition and Relation of Food Science( Lecture1).pptx
PDF
シュアーイノベーション採用ピッチ資料|Company Introduction & Recruiting Deck
PPT
2- CELL INJURY L1 Medical (2) gggggggggg
PPT
Gsisgdkddkvdgjsjdvdbdbdbdghjkhgcvvkkfcxxfg
PPTX
OnePlus 13R – ⚡ All-Rounder King Performance: Snapdragon 8 Gen 3 – same as iQ...
PPTX
FINAL PPT.pptx cfyufuyfuyuy8ioyoiuvy ituyc utdfm v
PDF
Why Today’s Brands Need ORM & SEO Specialists More Than Ever.pdf
PPTX
internship presentation of bsnl in colllege
PPTX
ESD MODULE-5hdbdhbdbdbdbbdbdbbdndbdbdbdbbdbd
PDF
iTop VPN Crack Latest Version 2025 Free Download With Keygen
PPTX
1751884730-Visual Basic -Unitj CS B.pptx
_Dispute Resolution_July 2022.pptxmhhghhhh
notes_Lecture2 23l3j2 dfjl dfdlkj d 2.ppt
APPROACH TO DEVELOPMENTALlllllllllllllllll
Principles of Inheritance and variation class 12.pptx
Your Guide to a Winning Interview Aug 2025.
A slide for students with the advantagea
PE3-WEEK-3sdsadsadasdadadwadwdsdddddd.pptx
Condensed_Food_Science_Lecture1_Precised.pptx
Prokaryotes v Eukaryotes PowerPoint.pptx
Definition and Relation of Food Science( Lecture1).pptx
シュアーイノベーション採用ピッチ資料|Company Introduction & Recruiting Deck
2- CELL INJURY L1 Medical (2) gggggggggg
Gsisgdkddkvdgjsjdvdbdbdbdghjkhgcvvkkfcxxfg
OnePlus 13R – ⚡ All-Rounder King Performance: Snapdragon 8 Gen 3 – same as iQ...
FINAL PPT.pptx cfyufuyfuyuy8ioyoiuvy ituyc utdfm v
Why Today’s Brands Need ORM & SEO Specialists More Than Ever.pdf
internship presentation of bsnl in colllege
ESD MODULE-5hdbdhbdbdbdbbdbdbbdndbdbdbdbbdbd
iTop VPN Crack Latest Version 2025 Free Download With Keygen
1751884730-Visual Basic -Unitj CS B.pptx

Bank security using MC

  • 1. 1 CHAPTER 1 INTRODUCTION This Project focuses onto implement RF TX and RF RX based Banking Security System. This system is implemented using an embedded microcontroller. The embedded microcontroller used here is PIC 16F887 Actually, the aim of the project is to implement an Automated Banking Security System. Security is the protection of something valuable to ensure that it is not stolen, lost, or altered. GSM Based bank safety locker security system provides more reliability and restricts the unauthorized person who is trying to enter into bank. The microcontroller circuitry indicates the theft to the required person. Primarily, the system functions with the help of different technologies like the Global Positioning System (GPS), traditional cellular network such as Global System for Mobile Communications (GSM) and other radio frequency medium.Today GSM fitted Banks, cars; ambulances, fleets and police vehicles are common sights on the roads of developed countries. GSM based bank safety locker security system is simple and costs less. 1.1 IDENTIFICATION NUMBER Quiet similar to the above digital code lock, it works on the same principle. This is the only thing which identifies the user as the registered nationalist as the password here is the government registered identification number. It can be anything driving license, passport, voter id, PAN card or any other proof. This is the same as the one used for the identification purpose while opening an account or a locker. This is set by the bank administration a verification.
  • 2. 2 CHAPTER 2 LITERATURE SURVEY A MULTI-LAYER BANK SECURITY SYSTEM Since last few years, security systems are getting more awareness and importance. A Multi-Layer Bank Security System is a system for validating, monitoring and controlling the security at bank locker rooms. Today, there are many banks using authorize access control approach to prevent the locker room from unauthorized access. In this paper highly reliable, multi-level and most efficient locker room security system has been designed. The system includes a biometric system, i.e. a fingerprint scanner and an iris scanner, which are responsible for the security of the main door of the locker room and the system also includes a RFID system to provide access of the locker room area to only authorize people. To monitor the unauthorized people in the locker room area a passive infrared sensor is fixed. In case of any unauthorized motion the picture from the camera will be mailed to security officials and the alarms will be on to inform the local security. The system proposed in this paper is a better security system in terms of number of level of security. AN EMBEDDED LABORATORY SECURITY MONITORING SYSTEM This paper presents the design and implementation of an Embedded Laboratory Security Monitoring System (ELSMS). The system includes a web server which acquires video information through camera, and Wireless Sensor Network (WSN) which gets environmental parameters through sensors and sends them to the web server.When an exception occurs, the MS sends Short Message Service (SMS) through GSM Modem, displays alarm information on web and
  • 3. 3 gives sound and light alarm, etc. SQLdatabase stores historical information related toenvironmental parameters for users' query. The system proposed in this paper is a kind of new monitoring system that is applicable to the lab and other fields that store valuables. DEVELOPMENTOF LOW COST PRIVATE OFFICE ACCESS CONTROL SYSTEM (OACS) Over the years, access control systems have become more and more sophisticated and several security measures have been employed to combat the menace of insecurity of lives and property. This is done by preventing unauthorized entrance into buildings through entrance doors using conventional and electronic locks, discrete access code, and biometric methods such as the finger prints, thumb prints, the iris and facial recognition. We have designed a flexible and low cost modular system based on integration of keypad, magnetic lock and a controller. PIC 16F876A which is an 8-bit Microcontroller, is used here as a main controller. A DISTRIBUTED SMART CARD BASED ACCESS CONTROL SYSTEM An access control system has the role to verify and mediate attempts made by users to access resources in a system. An access control system maps activities and resources to legitimate users. This paper presents a distributed smart card based access control system for a building. The system is Internet centered. Each door has a control access point and all these are connected to a server which will grant or not the access. A user requests access by using a smart card which memorizes the user's unique identity code. INTELLIGENT HIGH-SECURITY ACCESS CONTROL
  • 4. 4 Access control is an important security issue in particular because of terrorist threats. Access points are increasingly becoming equipped with advanced input sensors often based on biometrics, and with advanced intelligent methods that learn from experience. We have designed a flexible modular system based on integration of arbitrary access sensors and an arbitrary number of stand-alone modules. The system was tested with four sensors (a door sensor, an identity card reader, a fingerprint reader and a camera) and four independent modules (expert- defined rules, micro learning, macro learning and visual learning). Preliminary tests of the designed prototype are encouraging. BLOCK DIAGRAM Fig:2.1 PIC16F887 transmitter Micro controller PIC16F887 RF Transmitter KEYPAD Power supply unit Step down transformer(2 32 to 12vAC) Bridge rectifier Filter circuit Voltage regulator(IC 7805) LCD
  • 5. 5 Fig: 2.2 PIC16F887 with receiver Micro controller PIC16F887 RF Receiver KEYPAD Power Supply Unit Step down Transformer(230 to 12v AC) Step down Transformer(230 to 12v AC) Bridge Rectifier ger Filter Circuit Voltage Regulator(IC 7805) Relay DC Motor LCD
  • 6. 6 CHAPTER 3 EXISTING SYSTEM In most of the banks, the locker systems involve manual lock. Whenever the user wishes the use the locker, he should be assisted by the bank employee which leads to waste of time for both the customer and the employee. The major drawbacks of such manual lock systems are lack of security and the waiting time of the customers. It should be noted that the person accompanying the customer can be any employee who is free at that instant of time. Solely, time is wasted. This can be overcome by any automatic locker system. There are many techniques in which this can be implemented. In this project, RFID tags are used which holds the user’s information like locker number, username, etc., this RFID tag when read by the RFID reader will automatically open and close the locker. Thereby, security is guaranteed and the customers waiting time is drastically reduced. HARDWARE DESCRIPTION 3.1PIC 16F887 RISC ARCHITECTURE  Only 35 instructions to learn  All single-cycle instructions except branches  Operating frequency 0-20 MHz  Precision internal oscillator  Factory calibrated  Software selectable frequency range of 8MHz to 31KHz  Power supply voltage 2.0-5.5V  Consumption: 220uA (2.0V, 4MHz), 11uA (2.0 V, 32 KHz) 50nA (stand- by mode)
  • 7. 7  Power-Saving Sleep Mode  Brown-out Reset (BOR) with software control option  35 input/output pins  High current source/sink for direct LED drive  software and individually programmable pull-up resistor  Interrupt-on-Change pin  K ROM memory in FLASH technology  Chip can be reprogrammed up to 100.000 times  In-Circuit Serial Programming Option  Chip can be programmed even embedded in the target device  256 bytes EEPROM memory  Data can be written more than 1.000.000 times  368 bytes RAM memory A/D CONVERTER  14-channels  10-bit resolution  3 independent timers/counters  Watch-dog timer  Analogue comparator module with  Two analogue comparators  Fixed voltage reference (0.6V)  Programmable on-chip voltage reference  PWM output steering control  Enhanced USART module  Supports RS-485, RS-232 and LIN2.0  Auto-Baud Detect  Master Synchronous Serial Port (MSSP)
  • 8. 8  supports SPI and I2C mode Fig:3.1PIN DIAGRAM 3.2 INOUT DESCRIPTION Most pins of the PIC16F887 microcontroller are multi-functional as seen in figure above. For example, designator RA3/AN3/Vref+/C1IN+ for the fifth pin of the microcontroller indicates that it has the following functions:  RA3 Port A third digital input/output  AN3 Third analog input  Vref+ Positive voltage reference  C1IN+ Comparator C1 positive input Such pin functionality is very useful as it makes the microcontroller package more compact without affecting its operation. These various pin functions cannot be used simultaneously, but can be changed at any point during operation.
  • 9. 9 3.3 CENTRAL PROCESSOR UNIT (CPU) We are not going to bore you with the operation of the CPU at this stage. However, we will just state that the CPU is manufactured with RISC technology as it is an important factor when deciding which microcontroller to use. RISC stands for Reduced Instruction Set Computer, which gives the PIC16F877 two great advantages:  The CPU only recognizes 35 simple instructions. Just to mention that in order to program other microcontrollers in assembly language it is necessary to know more than 200 instructions by heart.  The execution time is the same for almost all instructions, and lasts for 4 clock cycles. The oscillator frequency is stabilized by a quartz crystal. The execution time of jump and branch instructions is 2 clock cycles. It means that if the microcontroller’s operating speed is 20MHz, the execution time of each instruction will be 200nS, i.e. the program will execute 5 million instructions per second! The fundamental operation of most CPUs, regardless of the physical form they take, is to execute a sequence of stored instructions that is called a program. The instructions to be executed are kept in some kind of computer memory. Nearly all CPUs follow the fetch, decode and execute steps in their operation, which are collectively known as the instruction cycle. After the execution of an instruction, the entire process repeats, with the next instruction cycle normally fetching the next-in-sequence instruction because of the incremented value in the program counter. In more complex CPUs, multiple instructions can be fetched, decoded, and executed simultaneously.
  • 10. 10 This section describes what is generally referred to as the "classic RISC pipeline". FETCH The first step, fetch, involves retrieving an instruction (which is represented by a number or sequence of numbers) from program memory. The instruction's location (address) in program memory is determined by a program counter (PC), which stores a number that identifies the address of the next instruction to be fetched. After an instruction is fetched, the PC is incremented by the length of the instruction so that it will contain the address of the next instruction in the sequence.Often, the instruction to be fetched must be retrieved from relatively slow memory, causing the CPU to stall while waiting for the instruction to be returned. This issue is largely addressed in modern processors by caches and pipeline architectures. DECODE The instruction that the CPU fetches from memory determines what the CPU will do. In the decode step, performed by the circuitry known as the instruction decoder, the instruction is converted into signals that control other parts of the CPU.The way in which the instruction is interpreted is defined by the CPU's instruction set architecture (ISA).Often, one group of bits (that is, a "field") within the instruction, called the opcode, indicates which operation is to be performed, while the remaining fields usually provide supplemental information required for the operation, such as the operands. Thoseoperands may be specified as a constant value (called an immediate value), or as the location of a value that may be a processor register or a memory address, as determined by some addressing mode. In some CPU designs the instruction decoder is implemented as a hardwired, unchangeable circuit. In others, a microprogram is used to translate instructions
  • 11. 11 into sets of CPU configuration signals that are applied sequentially over multiple clock pulses. In some cases the memory that stores the microprogram is rewritable, making it possible to change the way in which the CPU decodes instructions EXECUTE After the fetch and decode steps, the execute step is performed. Depending on the CPU architecture, this may consist of a single action or a sequence of actions. During each action, various parts of the CPU are electrically connected so they can perform all or part of the desired operation and then the action is completed, typically in response to a clock pulse. Very often the results are written to an internal CPU register for quick access by subsequent instructions. In other cases results may be written to slower, but less expensive and higher capacity main memory. For example, if an addition instruction is to be executed, the arithmetic logic unit (ALU) inputs are connected to a pair of operand sources (numbers to be summed), the ALU is configured to perform an addition operation so that the sum of its operand inputs will appear at its output, and the ALU output is connected to storage (e.g., a register or memory) that will receive the sum. Each basic operation is represented by a particular combination of bits known as the machine language opcode. While executing instructions in a machine language program, the CPU decides which operation to perform by “decoding” the opcode. A complete machine language instruction consists of an opcode and, in many cases, additional bits that specify arguments for the operation. Going up the complexity scale, a machine language program is a collection of machine language instructions that CPU executes.The actual mathematical operation for each
  • 12. 12 instruction is performed by a combinational logic circuit within the CPU’s processor known as the arithmetic logic unit or ALU. Hardwired into a CPU's circuitry is a set of basic operations it can perform, called an instruction set. Such operations may involve, for example, adding or subtracting two numbers, comparing two numbers, or jumping to a different part of a program. Each basic operation is represented by a particular combination of bits, known as the machine language op code.While executing instructions in a machine language program, the CPU decides which operation to perform by "decoding" the opcode. A complete machine language instruction consists of an opcode and, in many cases, additional bits that specify arguments for the operation (for example, the numbers to be summed in the case of an addition operation). Going up the complexity scale, a machine language program is a collection of machine language instructions that the CPU executes. The actual mathematical operation for each instruction is performed by a combinational logic circuit within the CPU's processor known as the arithmetic logic unit or ALU. In general, a CPU executes an instruction by fetching it from memory, using its ALU to perform an operation, and then storing the result to memory. Beside the instructions for integer mathematics and logic operations, various other machine instructions exist, such as those for loading data from memory and storing it back, branching operations, and mathematical operations on floating-point numbers performed by the CPU's floating-point unit (FPU). CONTROL UNIT The control unit of the CPU contains circuitry that uses electrical signals to direct the entire computer system to carry out stored program instructions. The control unit does not execute program instructions; rather, it directs other parts of
  • 13. 13 the system to do so. The control unit communicates with both the ALU and memory. ARITHMETIC LOGIC UNIT The arithmetic logic unit (ALU) is a digital circuit within the processor that performs integer arithmetic and bitwise logic operations. The inputs to the ALU are the data words to be operated on (called operands), status information from previous operations, and a code from the control unit indicating which operation to perform. Depending on the instruction being executed, the operands may come from internal CPU registers or external memory, or they may be constants generated by the ALU itself.When all input signals have settled and propagated through the ALU circuitry, the result of the performed operation appears at the ALU's outputs. The result consists of both a data word, which may be stored in a register or memory, and status information that is typically stored in a special, internal CPU register reserved for this purpose. MEMORY MANAGEMENT UNIT Most high-end microprocessors (in desktop, laptop, server computers) have a memory management unit, translating logical addresses into physical RAM addresses, providing memory protection and paging abilities, useful for virtual memory. Simpler processors, especially microcontrollers, usually don't include an MMU. 3.4MEMORY The PIC16F887 has three types of memory ROM, RAM and EEPROM. All of them will be separately discussed since each has specific functions, features and organization.
  • 14. 14 3.4.1ROM MEMORY ROM memory is used to permanently save the program being executed. This is why it is often called ‘program memory’. The PIC16F887 has 8Kb of ROM (in total of 8192 locations). Since the ROM memory is made with FLASH technology, its contents can be changed by providing a special programming voltage(13V).However, it is not necessary to explain it in detail as being automatically performed by means of a special program on the PC and a simple electronic device called the programmer. 3.4.2EEPROM MEMORY Similar to program memory, the contents of EEPROM is permanently saved, even when the power goes off. However, unlike ROM, the contents of EEPROM can be changed during the operation of the microcontroller. This is why this memory (256 locations) is perfect for permanently saving some of the results created and used during the operation. 3.4.3 RAM MEMORY This is the third and the most complex part of microcontroller memory. In this case, it consists of two parts: general-purpose registers and special-function registers (SFR). All these registers are divided in four memory banks to be explained later in the chapter.
  • 15. 15 Even though both groups of registers are cleared when power goes off and even though they are manufactured in the same manner and act in a similar way, their functions do not have many things in common. 3.5GENERAL-PURPOSE REGISTERS General-purpose registers are used for storing temporary data and results created during operation. For example, if the program performs counting (products on the assembly line), it is necessary to have a register which stands for what we in everyday life call ‘sum’. Since the microcontroller is not creative at all, it is necessary to specify the address of some general purpose register and assign it that function. A simple program to increment the value of this register by 1, after each product passes through a sensor, should be created.Now the microcontroller can execute the program as it knows what and where the sum to be incremented is. Similarly, each program variable must be pre-assigned some of the general- purpose registers. 3.6SPECIAL FUNCTION REGISTERS (SFRS) Special-function registers are also RAM memory locations, but unlike general-purpose registers, their purpose is predetermined during manufacturing process and cannot be changed. Since their bits are connected to particular circuits on the chip (A/D converter, serial communication module, etc.), any change of their contents directly affects the operation of the microcontroller or some of its circuits. For example, the ADCON0 register controls the operation of A/D converter. By changing its bits it is determined which port pin is to be configured as converter input, the moment conversion is to start as well as the speed of conversion.Another feature of these memory locations is that they have their
  • 16. 16 names (both registers and their bits), which considerably simplifies the process of writing a program. Since high-level programming languages can use the list of all registers with their exact addresses, it is enough to specify the name of a register in order to read or change its contents. 3.7RAM MEMORY BANKS The RAM memory is partitioned into four banks. Prior to accessing any register during program writing (in order to read or change its contents), it is necessary to select the bank which contains that register. Two bits of the STATUS register are used for bank selection to be discussed later. In order to simplify the operation, the most commonly used SFRs have the same address in all banks, which enables them to be easily accessed. 3.8STACK A part of RAM used as stack consists of eight 13-bit registers. Before the microcontroller starts to execute a subroutine (CALL instruction) or when an interrupt occurs, the address of the first next instruction to execute is pushed onto the stack, i.e. one of its registers. Thanks to that the microcontroller knows from where to continue regular program execution upon a subroutine or an interrupt execution. This address is cleared after returning to the program because there is no need to save it any longer, and one location of the stack becomes automatically available for further use. It is important to bear in mind that data is always circularly pushed onto the stack. It means that after the stack has been pushed eight times, the ninth push overwrites the value that was stored with the first push. The tenth push overwrites the second push and so on. Data overwritten in this way is not recoverable. In
  • 17. 17 addition, the programmer cannot access these registers for write or read and there is no Status bit to indicate stack overflow or stack underflow conditions. For this reason, it is necessary to take special care of it during program writing. 3.9LCD A liquid-crystal display (LCD) is a flat panel display, electronic visual display, or video display that uses the light modulating properties of liquid crystals. Liquid crystals do not emit light directly.LCDs are available to display arbitrary images (as in a general-purpose computer display) or fixed images which can be displayed or hidden, such as preset words, digits, and 7-segment displays as in a digital clock. They use the same basic technology, except that arbitrary images are made up of a large number of small pixels, while other displays have larger elements. Fig:3.2 LCD LCDs are used in a wide range of applications including computer monitors, Televisions, instrument panels, aircraft cockpit displays, and signage. They are common in consumer devices such as DVD players, gaming devices, clocks, watches, calculators, and telephones, and have replaced cathode raytube (CRT) displays in most applications. They are available in a wide arrange of screen sizes than CRT and plasma displays, and since they do notuse phosphors, they do not suffer image burn-in. LCDs are, however, susceptible to image persistence.The LCD screen is more energy efficient and can be disposed of more safelythan a
  • 18. 18 CRT. Liquid crystals do not emit light directly.LCDs are available to display arbitrary images (as in a general-purpose computer display) or fixed images which can be displayed or hidden, such as preset words, digits, and 7-segment displays as in a digital clock. They use the same basic technology, except that arbitrary images are made up of a large number of small pixels, while other displays have larger elements.They are common in consumer devices such as DVD players, gaming devices, clocks, watches, calculators, and telephones, and have replaced cathode raytube (CRT) displays in most applications. They are available in a wide arrange of screen sizes than CRT and plasma displays, and since they do notuse phosphors, they do not suffer image burn-in. LCDs are, however,susceptible to image persistence. 3.9.1PIN DIAGRAM FOR LCD Fig: 3.3PIN CONFIGURATION OF LCD Usually these days you will find single controller LCD modules are used more in the market. So in the tutorial we will discuss more about the single controller LCD, the operation and everything else is same for the double controller too. The following gives a look at the basic information which is there in every LCD.
  • 19. 19 Busy Flag is a status indicator flag for LCD. When we send a command or data to the LCD for processing, this flag is set (i.e. BF =1) and as soon as the instruction is executed successfully this flag is cleared (BF = 0). This is helpful in producing and exact amount of delay for the LCD processing. To read Busy Flag, the condition RS = 0 and R/W = 1 must be met and The MSB of the LCD data bus (D7) act as busy flag. When BF = 1 means LCD is busy and will not accept next command or data and BF = 0 means LCD is ready for the next command or data to process. There are two 8-bit registers in HD44780 controller Instruction and Data register. Instruction register corresponds to the register where you send commandsto LCD E.g. LCD shift command, LCD clear, LCD address etc. and Data register is used for storing data which is to be displayed on LCD. , which operate at different speeds, or various peripheral control devices.
  • 20. 20 The internal operation of the LCD is determined by signals sent from the MCU when send the enable signal of the LCD is asserted, the data on the pins is latched in to the data register and data is then moved automatically to the DDRAM and hence is displayed on the LCD. Data Register is not only used for sending data to DDRAM but also for CGRAM, the address where you want to send the data, is decided by the instruction you send to LCD. We will discuss more on LCD instruction set further in this tutorial.
  • 21. 21 Only the instruction register (IR) and the data register (DR) of the LCD can be controlled by the MCU. when send the enable signal of the LCD is asserted, the data on the pins is latched in to the data register and data is then moved automatically to the DDRAM and hence is displayed on the Before starting the internal operation of the LCD, control information is temporarily stored into these registers to allow interfacing with various MCUs, which operate at different speeds, or various peripheral control devices. The internal operation of the LCD is determined by signals sent from the MCU. These signals, which include register selection signal (RS), read/write signal (R/W), and the data bus (DB0 to DB7), make up the LCD instructions (Table 3). 3.10RF TX & RX In generally, the wireless systems designer has two overriding constraints: it must operate over a certain distance and transfer a certain amount of information within a data rate. The RF modules are very small in dimension and have a wide operating voltage range i.e. 3V to 12V. Basically the RF modules are 433 MHz RF transmitter and receiver modules. The transmitter draws no power when transmitting logic zero while fully suppressing the carrier frequency thus consume significantly low power in battery operation. When logic one is sent carrier is fully on to about 4.5mA with a 3volts power supply. The data is sent serially from the transmitter which is received by the tuned receiver. Transmitter and the receiver are duly interfaced to two microcontrollers for data transfer. Features of RF Module:  Receiver frequency 433MHz
  • 22. 22  Receiver typical frequency 105Dbm  Receiver supply current 3.5mA  Low power consumption  Receiver operating voltage 5v  Transmitter frequency range 433.92MHz  Transmitter supply voltage 3v~6v  Transmitter output power 4v~12v Main Factors Affecting RF Module’s Performance As compared to the other radio-frequency devices, the performance of an RF module will depend on several factors like by increasing the transmitter’s power a large communication distance will be gathered. However, which will result in high electrical power drain on the transmitter device, which causes shorter operating life of the battery powered devices. Also by using this devices at higher transmitted power will create interference with other RF devices. 433 MHz RF Transmitter and Receiver: In many projects we use RF modules for transmit and receive the data because it has high volume of applications than IR. RF signals travel in the transmitter and receiver even when there is an obstruction. It operates at a specific frequency of 433MHz.RF transmitter receives serial data and transmits to the receiver through an antenna which is connected to the 4th pin of the transmitter. When logic 0 applied to transmitter then there is no power supply in transmitter. When logic 1 is applied to transmitter then transmitter is ON and there is a high power supply in the range of 4.5mA with 3V voltage supply.
  • 23. 23 Features of RF Transmitter and Receiver:  Receiver frequency: 433MHz  Receiver typical sensitivity: 105Dbm  Receiver current supply: 3.5mA  Receiver operating voltage: 5V  Low power consumption  Transmitter frequency range: 433.92MHz  Transmitter supply voltage: 3V~6V  Transmitter output power: 4~12Dbm 3.10.1 DC MOTOR In any electric motor, operation is based on simple electromagnetism. A current-carrying conductor generates a magnetic field; when this is then placed in an external magnetic field, it will experience a force proportional to the current in the conductor, and to the strength of the external magnetic field. As you are well aware of from playing with magnets as a kid, opposite (North and South) polarities attract, while like polarities (North and North, South and South) repel. The internal configuration of a DC motor is designed to harness the magnetic interaction between a current-carrying conductor and an external magnetic field to generate rotational motion.By looking at a simple 2- pole DC electric motor (here red represents a magnet or winding with a "North" polarization, while green represents a magnet or winding with a "South" polarization).
  • 24. 24 Fig:3.4DC MOTOR TWO POLE Every DC motor has six basic parts -- axle, rotor (a.k.a., armature), stator, commutator, field magnet(s), and brushes. In most common DC motors (and all that Beamers will see), the external magnetic field is produced by high-strength permanent magnets1. The stator is the stationary part of the motor -- this includes the motor casing, as well as two or more permanent magnet pole pieces. The rotor (together with the axle and attached commutator) rotate with respect to the stator. The rotor consists of windings (generally on a core), the windings being electrically connected to the commutator. The above diagram shows a common motor layout -- with the rotor inside the stator (field) magnets. In real life, though, DC motors will always have more than two poles (three is a very common number). In particular, this avoids "dead spots" in the commutator. You can imagine how with our example two-pole motor, if the rotor is exactly at the middle of its rotation (perfectly aligned with the field magnets), it will get "stuck" there. Meanwhile, with a two-pole motor, there is a moment where the commutator shorts out the power supply (i.e., both brushes touch both commutator contacts simultaneously). This would be bad for the power supply, waste energy, and damage motor components as well. Yet another disadvantage of such a simple motor is that it would exhibit a high amount of torque "ripple" (the amount oftorque it could produce is cyclic with the position of the rotor). So since
  • 25. 25 most small DC motors are of a three-pole design, let's tinker with the workings of one via an interactive animation (JavaScript required): Fig:3.5DC MOTOR 3 POLE By noticing a few things from this -- namely, one pole is fully energized at a time (but two others are "partially" energized). As each brush transitions from one commutator contact to the next, one coil's field will rapidly collapse, as the next coil's field will rapidly charge up (this occurs within a few microsecond). We'll see more about the effects of this later, but in the meantime you can see that this is a direct result of the coil windings' series wiring: The use of an iron core armature (as in the Mabuchi, above) is quite common, and has a number of advantages2. First off, the iron core provides a strong, rigid support for the windings -- a particularly important consideration for high-torque motors. The core also conducts heat away from the rotor windings, allowing the motor to be driven harder than might otherwise be the case. Iron core construction is also relatively inexpensive compared with other construction types.
  • 26. 26 In small motors, an alternative design is often used which features a 'coreless' armature winding. This design depends upon the coil wire itself for structural integrity. As a result, the armature is hollow, and the permanent magnet can be mounted inside the rotor coil. Coreless DC motors have much lower armature inductance than iron-core motors of comparable size, extending brush and commutator life. Fig:3.6DC MOTOR 3.10.2 RELAY An iron core is surrounded by a control coil. As shown, the power source is given to the electromagnet through a control switch and through contacts to the load. When current starts flowing through the control coil, the electromagnet starts energizing and thus intensifies the magnetic field. Thus the upper contact arm starts to be attracted to the lower fixed arm and thus closes the contacts causing a short circuit for the power to the load. On the other hand, if the relay was already de-energized when the contacts were closed, then the contact move oppositely and make an open circuit.As soon as the coil current is off, the movable armature will be returned by a force back to its initial position. This force will be almost equal to half the strength of the magnetic force. This force is mainly provided by two factors. They are the spring and also gravity. Relays are mainly made for two basic operations. One is low voltage application and the other is high voltage. For low voltage applications, more
  • 27. 27 preference will be given to reduce the noise of the whole circuit. For high voltage applications, they are mainly designed to reduce a phenomenon called arcing. Fig:3.7 RELAY 3.10.3 RELAY BASICS The basics for all the relays are the same. Take a look at a 4 – pin relay shown below. There are two colours shown. The green colour represents the control circuit and the red colour represents the load circuit. A small control coil is connected onto the control circuit. A switch is connected to the load. This switch is controlled by the coil in the control circuit. Now let us take the different steps that occur in a relay.  Energized Relay (ON) As shown in the circuit, the current flowing through the coils represented by pins 1 and 3 causes a magnetic field to be aroused. This magnetic field causes the closing of the pins 2 and 4. Thus the switch plays
  • 28. 28 an important role in the relay working. As it is a part of the load circuit, it is usedto control an electrical circuit that is connected to it. Thus, when the relay in energized the current flow will be through the pins 2 and 4. Fig:3.8ENERGIZED RELAY (ON)  De – Energized Relay (OFF) As soon as the current flow stops through pins 1 and 3, the switch opens and thus the open circuit prevents the current flow through pins 2 and 4.
  • 29. 29 Fig: 3.9DE-ENERGIZED RELAY (OFF)  Single Pole Single Throw (SPST) – This type of relay has a total of four terminals. Out of these two terminals can be connected or disconnected. The other two terminals are needed for the coil.  Single Pole Double Throw (SPDT) – This type of a relay has a total of five terminals. Out f these two are the coil terminals. A common terminal is also included which connects to either of two others.  Double Pole Single Throw (DPST) – This relay has a total of six terminals. These terminals are further divided into two pairs. Thus they can act as two SPST’s which are actuated by a single coil. Out of the six terminals two of them are coil terminals.
  • 30. 30  Double Pole Double Throw (DPDT) – This is the biggest of all. It has mainly eight relay terminals. Out of these two rows are designed to be change over terminals. They are designed to act as two SPDT relays which are actuated by a single coil. RELAY APPLICATIONS  Relays are used to realize logic functions. They play a very important role in providing safety critical logic.  Relays are used to provide time delay functions. They are used to time the delay open and delay close of contacts.  Relays are used to control high voltage circuits with the help of low voltage signals. Similarly they are used to control high current circuits with the help of low current signals.  They are also used as protective relays. By this function all the faults during transmission and reception can be detected and isolated.  Relays were primarily used in telegraph to regenerate weak signals received at intermediate transmissions during transmission.  Low power devices such as Microprocessors can drive relays to control electrical loads beyond their direct drive capability.  In an automobile, a starter relay allows the high current of the cranking motor to be controlled with small wiring and contacts in the ignition key  They are more resistant than semiconductors to nuclear radiation and are used also as circuit breakers and protective relays.
  • 31. 31 CHAPTER 4 SOFTWARE REQUIREMENTS The software which is used in this technique is shown below.  Real time operating system  MP Lab v8.63  Proteus8.  Embedded C The proposed system’s software section has Real Time Operating System only, because this proposed system design is minimal cost so it doesn’t need any higher end and costly software but it needs reliable, secure, multi tasked, preemptive and real OS software. REAL TIME OPERATING SYSTEM Commercial Operating system form a continuum of functionality, performance and price. These operating systems range from those that offer a basic preemptive scheduler, a few key system services, are usually inexpensive, come with modifiable source code and are royalty free to those more sophisticated operating systems that typically include a lot of functionality beyond the basic scheduler and can be quite expensive. With such a variety of operating systems and features to choose from, it can be difficult to decide which is best for embedded application. Many developers make their decision based on performance, functionality or compatibility with their choice of compiler, debugger and other development tools. Many use integrated development environments (IDEs) that enable them to develop over a wider range of RTOSs.A real-time operating system (RTOS) is an operating system that guarantees a certain capability within a specified time constraint. For example, an operating system
  • 32. 32 might be designed to ensure that a certain object was available for a robot on an assembly line. In what is usually called a "hard" real-time operating system, if the calculation could not be performed for making the object available at the designated time, the operating system would terminate with a failure. In a "soft" real-time operating system, the assembly line would continue to function but the production output might be lower as objects failed to appear at their designated time, causing the robot to be temporarily unproductive. Some real-time operating systems are created for a special application and others are more general purpose. Some existing general purpose operating systems claim to be a real-time operating systems. To some extent, almost any general purpose operating system such as Microsoft's Windows 2000can be evaluated for its real-time operating system qualities. That is, even if an operating system doesn't qualify, it may have characteristics that enable it to be considered as a solution to a particular real-time application problem. MPLAB VERSION 8.6 MPLAB is a free integrated development environment for the development of embedded applications on PIC and PICmicrocontrollers, and is developed by Microchip Technology. MPLAB X is the latest edition of MPLAB, and is developed on the Net Beansplatform. MPLAB and MPLAB X support project management, code editing, debugging and programming of Microchip 8-bit, 16- bit and 32- bit PIC microcontrollers. MPLAB is designed to work with MPLAB- certified devices such as the MPLAB ICD 3 and MPLAB REAL ICE, for programming and debugging
  • 33. 33 PIC Microcontrollers using a personal computer. PICKitprogrammers are alsosupported by MPLAB. PROTEUS 8 Proteus 7.0 is a Virtual System Modelling (VSM) that combines circuit simulation, animated components and microprocessor models to co-simulate the complete microcontroller based designs. This is the perfect tool for engineers to test their microcontroller designs before constructing a physical prototype in real time. This program allows users to interact with the design using on-screen indicators and/or LED and LCD displays and, if attached to the PC, switches and buttons.One of the main components of Proteus 7.0 is the Circuit Simulation- product that uses a SPICE3f5 analogue simulator kernel combined with an event- driven digital simulator that allow users to utilize any SPICE model by any manufacturer. Proteus VSM comes with extensive debugging features, including breakpoints, single stepping and variable display for a neat design prior to hardware prototyping. In summary, Proteus 7.0 is the program to use when you want to simulate the interaction between software running on a microcontroller and any analog or digital electronic device connected to it. The application framework lets you view modules of Proteus as tabs in a single window or, via drag and drop, as separate windows for a side-by-side view The common parts database enables sharing of information between schematic and PCB so that changes to data areinstantly reflected across the software. The integrated VSMStudio IDE binds your firmware project to your schematic design and Active Popups bring the schematic into your VSMStudio debug session.
  • 34. 34 EMBEDDED C Embedded C is a set of language extensions for the C Programming language by the C Standards committee to address commonality issues that exist between C extensions for different embedded systems. Historically, embeddedC programming requires non-standard extensions to the C language in order to support exotic features such as fixed-point arithmetic, multiple distinct memory blank, and basic I/O operations. In 2008, the C Standards Committee extended the C language to address these issues by providing a common standard for all implementations to adhere to. It includes a number of features not available in normal C, such as, fixed-point arithmetic, named address spaces, and basic I/O hardware addressing.
  • 35. 35 CHAPTER 5 IMPLEMENTATION& RESULTS PIC TRANSMITTER OUTPUT: SENDING MESSAGETO RECEIVER
  • 36. 36
  • 38. 38 AFTER DECRYPTING MESSAGE AT THE RECEIVER:
  • 39. 39 CHAPTER 6 CONCLUSION This is a real time application based project which emphasizeson bringing a revolution in the bank locker security system by making the procedure a little easy and more systematic for the bank officials. This is just a proposed model which when implemented would surely give a very good protection to the lockers curbing theft and making the lockers more reliable. The assurance given to the bank customers will encourage them to use it and hence protect their valuables from theft or any kind of robbery. This not only aims at easing the work load of the bank officials but also makes it an easy and comfortable process for its users, the general public. As this is protected by the vicinity sensor it can detect any unwanted or forced entry inside the bank locker area and can protect the lockers in the most efficient way.
  • 40. 40 REFERENCES [1]. Parvathy A, Venkata Rohit Raj, Venumadhav, Manikanta, “RFID Based Exam Hall Maintenance System’’, IJCA Special Issue on “Artificial Intelligence Techniques - Novel Approaches & Practical Applications” AIT, 2011 [2]. Gyanendra K Verma, Pawan Tripathi, “A Digital Security System with Door Lock System Using RFID Technology”, International Journal of Computer Applications (IJCA) (0975 – 8887), Volume 5– No.11, August 2010 [3]. Kumar Chaturvedula .U.P, “RFID Based Embedded System for Vehicle Tracking and Prevention of Road Accidents”, International Journal of Engineering Research & Technology (IJERT) , Vol. 1 Issue 6, August – 2012, ISSN: 2278- 0181 [4]. Islam, N.S. Wasi-ur-Rahman, M. “An intelligent SMSbased remote Water Metering System”. 12th International Conference on Computers and Information Technology, 2009, 21-23 Dec. 2009, Dhaka, Bangladesh. [5]. Mohd Helmy Abd Wahab, Siti Zarina Mohd Muji, Fazliza Md. Nazir. “Integrated Billing System through GSM Network”. In Proceeding of 3rd
  • 41. 41 International Conference on Robotics, Vision, Information and Signal Processing 2007 (ROVISP2007), Penang, 28 – 30 November 2007 [6]. Mohd Helmy Abd Wahab, Azhar Ismail, Ayob Johari and Herdawatie Abdul Kadir. “SMS-Based Electrical Meter Reading”. [7] Saranya K, R Mohanapriya, J Udhayan, “A Review on SymmetricKey Encryption Techniques in Cryptography”, Internation Journal of Science, Engineering and Technology Research (IJSETR), Volume 3, Issue 3, March 2014 [8] MajdiAl-qdah& Lin Yi Hui “Simple Encryption/Decryption Application” published in International Journal of Computer Science and Security, Volume (1) : Issue (1). [9] Gupta Vishwa, Singh Gajendra, Gupta Ravindra, “Advance cryptography algorithm to improve data security”, IJARCSSE, Volume 2, Issue 1, January 20112 ISSN: 2277 128X [10] Dhull Sonia, BeniwalSonal, KalraPreeti, “Polyalphabetic Cipher Techniques Used for Encryption Purpose”, IJARCSSE, Volume 3, Issue 2, February 2013, ISSN 2277 128X [11]VikasAgarwal ,ShrutiAgarwal and Rajesh Deshmukh“Analysis and review of encryption and decryption for secure communication”,IJSER, Volume 2,Issue 2,February 2014,ISSN:2347- 3848. [12] KohliRashi, Kumar Manoj, “Optimized on System Analysis Using AES and X-tea”, IJARCSSE, Volume 3, Issue 2, February 2013,
  • 42. 42 ISSN: 2277 128X [13] Mitali, Kumar Vijay, Sharma Arvind, “A Survey on Various Cryptography Techniques”, IJETTCS, Volume 3, Issue 4, July- August 2014, ISSN 2278-6856 [14] Mao Wenbo, Boyd Colin, “Classification of Cryptographic Techniques in Authentication Protocols”, Communications Research Laboratory, Department of Electrical Engineering, University of Manchester [15] Gyanendra K Verma, PawanTripathi, “A Digital Security System with Door Lock System Using RFID Technology”, International Journal of Computer Applications (IJCA) (0975 – 8887), Volume 5– No.11, August 2010 [16] Carelin Felix and I. Jacob Raglend, “Home Automation Using GSM”, Proceedings of 2011 International Conference on Signal Processing, Computing and Networking Technologies, pp. 15-19, 2011 [17] Pravada P. Wankhade1 and Prof. S.O. Dahad2, “Real Time Vehicle locking and Tracking System using GSM and GPS Technology-An Anti-theft System”, International Journal of Technology And Engineering System(IJTES): Jan –March 2011- Vol.2.No.3. [18] Ahmad A.W., Jan N., Iqbal S. and Lee C., “ Implementation of ZigBee-GSM based home security monitoring and remote control system”, IEEE 54th International Midwest Symposium on Circuits and Systems
  • 43. 43